Share via

JUst in time access for domain admin access

SAGA 45 Reputation points
2026-03-17T05:21:42.0233333+00:00

Hi I remember there was a feature which is like Just in time access to grant domain admin access or privilege access since 2016 onpremise AD. so this will add a attribute with TTL value and after that time it will revoke that access automatically. I have been searching the required blog but could not find one. Could you please share that information for the on-premise active directory. Require pre-requisites information and implementation process

Windows for business | Windows Server | Directory services | Active Directory
0 comments No comments

Answer accepted by question author

  1. HLBui 5,945 Reputation points Independent Advisor
    2026-03-18T07:19:01.4+00:00

    Good day SAGA

    The TTL-based group membership feature isn’t “on” by default, even if your forest/domain functional level is 2016. You need to explicitly enable the Privileged Access Management (PAM) optional feature using:

    Enable-ADOptionalFeature -Identity "Privileged Access Management Feature" -Scope ForestOrConfigurationSet -Target <YourForestName>

    Once enabled, you’ll be able to use the -MemberTimeToLive parameter with Add-ADGroupMember. Without that, the command will throw the “parameter is incorrect” error you saw.

    About the irreversible part: enabling this optional feature does extend the schema, and you can’t roll it back. That said, it’s a supported Microsoft feature, and it doesn’t break existing functionality. It simply adds the ability to assign temporary group memberships with TTL. The main consideration is making sure your forest is healthy and replication is solid before you flip the switch.

    So yes, you do need to enable it, and while it’s irreversible, it’s safe , it won’t disrupt your current infra. It just unlocks the JIT capability you’re after.

    If everything is okay, don't forget to share your experience with the issue by "Accept answer". If you need more information, feel free to leave a message. We are happy to help!

    Was this answer helpful?

    2 people found this answer helpful.

2 additional answers

Sort by: Most helpful
  1. HLBui 5,945 Reputation points Independent Advisor
    2026-03-17T08:20:49.2066667+00:00

    Hi SAGA

    It is the Privileged Access Management (PAM) with Time-to-Live (TTL) attributes feature that was introduced in Windows Server 2016 Active Directory. It’s basically Microsoft’s way of giving “just-in-time” admin rights without leaving permanent elevated accounts hanging around. Instead of making someone a Domain Admin forever, you grant them the role with a TTL value, and once that timer expires, the attribute automatically clears and the elevated access is revoked. Super handy for reducing attack surface and meeting compliance requirements.

    Pre-requisites you’ll need:

    • Your AD forest has to be at Windows Server 2016 functional level (both domain and forest).
    • You’ll need to set up a Privileged Access Management (PAM) environment, which usually involves a bastion forest (sometimes called a “shadow forest”) to manage these temporary privileges.
    • Proper replication and trust between your production forest and the PAM/bastion forest.

    Implementation process at a high level:

    • Create the bastion forest and establish a one-way trust with your production forest.
    • Configure shadow principals (basically mirrored accounts/groups) in the bastion forest that map to your privileged groups in the production forest.
    • Use PowerShell or the PAM APIs to grant membership with a TTL. For example, you can run something like Add-ADGroupMember -Member <user> -Identity "Domain Admins" -MemberTimeToLive (New-TimeSpan -Minutes 30) to give someone Domain Admin rights for 30 minutes.
    • Once the TTL expires, AD automatically removes the user from the group no manual cleanup needed.

    If this guidance proves helpful, feel free to click “Accept Answer” so we know we’re heading in the right direction and let me know if you need any assistance. Thank you!

    Was this answer helpful?


  2. Q&A Assist
    2026-03-17T05:21:56.6066667+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The feature being described is Microsoft’s just-in-time (JIT) privileged access, implemented for on-premises Active Directory through Privileged Access Management (PAM) in Microsoft Identity Manager (MIM), and conceptually related to Just Enough Administration (JEA).

    In this model:

    • Privileged access (for example, Domain Admin–equivalent rights) is granted only just-in-time and for a limited duration.
    • After the approved time window expires, the user is automatically removed from the privileged group, effectively revoking Domain Admin–level access.
    • This is implemented via a bastion forest and temporary group membership, not permanent standing membership.

    Key points from the PAM/JIT model:

    1. JIT and JEA principles
      • PAM builds on just-in-time administration and Just Enough Administration (JEA).
      • JEA defines a constrained PowerShell endpoint and command set for privileged tasks.
      • An eligible user enables the needed permission for a specific task; the permission automatically expires after a specified time so that an attacker cannot reuse it.
    2. How PAM is set up for JIT privileged access
      PAM setup and operation follow four steps:
      • Prepare: Identify highly privileged groups (for example, Domain Admins) in the existing forest and recreate corresponding groups without members in a bastion forest.
      • Protect: Configure lifecycle and authentication protection (for example, MFA) for JIT requests.
      • Operate: When a request is approved and authentication requirements are met, a user account is temporarily added to a privileged group in the bastion forest for a pre-set amount of time. During that window, the account has all privileges assigned to that group (including Domain Admin–level access if that is what the group represents). After the time expires, the account is automatically removed from the group.
      • Monitor: PAM provides auditing, alerts, and reports of privileged access requests and activities, helping detect unauthorized or “inside” attacks such as direct additions to privileged groups in the original forest.
    3. Behavior from the admin’s perspective
      • An admin requests elevation (for example, to a group that confers Domain Admin–equivalent rights).
      • PAM/MIM approves based on policy, adds the admin to the privileged group with a time-bound membership.
      • The membership is effectively governed by a TTL-like concept: once the configured duration elapses, the system removes the membership automatically, so there is no standing Domain Admin access.
    4. Why this is used
      • Aligns with the “avoid standing access” principle: no permanent Domain Admin membership.
      • Reduces risk from credential theft and malicious insiders, because elevated rights are available only for short, audited windows.

    For Azure and Microsoft Entra ID, the same principle is implemented via Microsoft Entra Privileged Identity Management (PIM), which provides JIT role activation with automatic expiration, MFA, approval workflows, and auditing. For on-premises AD, the corresponding concept is MIM PAM with JIT group membership.


    References:

    Was this answer helpful?

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.